General

  • Target

    IvAEGoijbASEGjo.exe

  • Size

    4.8MB

  • Sample

    230205-2y5vmsef2x

  • MD5

    d9b79da11f22ccdb255572afae699563

  • SHA1

    0918ecc9efee1b95d002c5c2884f3108e731c302

  • SHA256

    2effe116bae12db344d860be05ab14d7f38ea599a7c8bb873477f101d324c5ec

  • SHA512

    875711db059d06368c1921ba41fa3cd07b4b376f2badd3a20f2ffa7745b6cb9cd5d738a99baaf107d0f0aaca8ad798ad4ad1d92956f47419690912afab99a20c

  • SSDEEP

    98304:P27dEgmm1/tAE0rlxcFv7gV66KQcwzdHdjEtzGOIkXBfKM:+Cg92E6fRwrkHdMSMRff

Malware Config

Targets

    • Target

      IvAEGoijbASEGjo.exe

    • Size

      4.8MB

    • MD5

      d9b79da11f22ccdb255572afae699563

    • SHA1

      0918ecc9efee1b95d002c5c2884f3108e731c302

    • SHA256

      2effe116bae12db344d860be05ab14d7f38ea599a7c8bb873477f101d324c5ec

    • SHA512

      875711db059d06368c1921ba41fa3cd07b4b376f2badd3a20f2ffa7745b6cb9cd5d738a99baaf107d0f0aaca8ad798ad4ad1d92956f47419690912afab99a20c

    • SSDEEP

      98304:P27dEgmm1/tAE0rlxcFv7gV66KQcwzdHdjEtzGOIkXBfKM:+Cg92E6fRwrkHdMSMRff

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks